Posts written by cwilkinson
Date: 13 October 2016

Author: cwilkinson

Don't Jump! How to Handle a Ransomware Attack

STEP:1 CALL BEDROC

Ransomware is obviously analogous to kidnapping, and dealing with the perpetrators can feel much like negotiating with a jumper standing on the edge of high-rise roof. The Institute for Critical Infrastructure Technology recently released a report that in part describes how to deal with criminals when they are holding your data hostage. The report talks of what to do once a breach has been found.

ICIT says the proper response will depend on the risk tolerance of the..

Tags:

Date: 19 February 2015

Author: cwilkinson

FireEye: A Full Solution

by Todd Plambeck, VP of Technology at Bedroc

I recently attended a Lunch & Learn with our regional FireEye Team. My goal of attending the meeting was to understand the integration capabilities of the FireEye Solution and how the Mandiant Endpoint Software (now HX) features are progressing. Bedroc has been a FireEye Partner for approximately eighteen months and was recognized at FireEye’s Momentum 2015 Conference for putting together one of their largest deals of 2014.

The training started with..

Tags:

Date: 20 January 2015

Author: cwilkinson

Press Release: Bedroc Acquires IT Security and Consulting Partner, OneSource Computing, Inc.

NASHVILLE, January 19, 2014/Bedroc/- Franklin, Tennessee based IT solutions provider, Bedroc, has acquired another local, rapidly growing provider, OneSource Computing, Inc. The acquisition took place early January, 2015 and puts Bedroc in the position to begin the New Year with extra momentum. Bedroc recently earned a spot on CRN’s Fast Growth 150 of 2014 list with approximately $35 million in revenue. "One of our biggest challenges has been keeping up with our customers' demand for..
Date: 18 March 2014

Author: cwilkinson

Missed FireEye Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It

On Saturday, Nov. 30, the hackers had set their traps and had just one thing to do before starting the attack: plan the data’s escape route. As they uploaded exfiltration malware to move stolen credit card numbers—first to staging points spread around the U.S. to cover their tracks, then into their computers in Russia—FireEye spotted them. Bangalore got an alert and flagged the security team in Minneapolis.

Read more here...

Date: 17 March 2014

Author: cwilkinson

Riverbed Recognized As a “Leader” in Gartner’s First Magic Quadrant for Network Performance Monitoring and Diagnostics (NPMD)

“As applications continue to become increasingly complex and distributed, it is absolutely essential to have a holistic operational view of application performance, from the end-user, through the network and infrastructure, and deep into the actual application components and code. Only Riverbed delivers this complete performance picture, and only Riverbed can also accelerate poorly performing applications,” said Paul Brady, General Manager of the Riverbed Performance Management business unit at..

Date: 07 March 2014

Author: cwilkinson

Bedroc Welcomes New Team Member!

Bedroc would like to welcome Malena Weeks to the Accounting & HR team.  As our new staff accountant Malena will use her experience and fantastic attitude to help create efficiencies and improve processes.  We are very excited to have her here. Welcome Malena!

Date: 06 March 2014

Author: cwilkinson

Bedroc Welcomes New Team Member!

Bedroc would like to welcome Scot Simmons to our Professional Services team. Scot joins Bedroc as a Solutions Architect with a focus on Cisco Collaboration. Scot will be a strong addition to our experienced Collaboration Practice.  Welcome Scot!

Date: 17 January 2014

Author: cwilkinson

Gartner Ranks VSPEX #1 for Integrated Reference Architecture Solutions

What do you get when you offer customers a private cloud solution that is simple and fast to deploy while offering real choice?

Read more here...

Tags:

Date: 12 December 2013

Author: cwilkinson

Can multiple SSID Wi-Fi configurations contribute to performance woes?

Many enterprises add new service set identifiers to their wireless LAN infrastructure every time a new wireless use case emerges. This practice can crowd the network and degrade performance. Instead, network managers should consolidate service set identifiers with dynamic policy controllers.Read more here...

Date: 12 December 2013

Author: cwilkinson

Riverbed: Cascade and Steelhead integration boosts app visibility

Riverbed Technology has integrated its Cascade performance management software into its Steelhead WAN optimization product line to combine deep application visibility and network control from anywhere on the network.

Read more here.....